Movatterモバイル変換


[0]ホーム

URL:


US20020095586A1 - Technique for continuous user authentication - Google Patents

Technique for continuous user authentication
Download PDF

Info

Publication number
US20020095586A1
US20020095586A1US09/764,827US76482701AUS2002095586A1US 20020095586 A1US20020095586 A1US 20020095586A1US 76482701 AUS76482701 AUS 76482701AUS 2002095586 A1US2002095586 A1US 2002095586A1
Authority
US
United States
Prior art keywords
security
computer
computing device
user
securely
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US09/764,827
Inventor
Ronald Doyle
John Hind
Marcia Peters
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines CorpfiledCriticalInternational Business Machines Corp
Priority to US09/764,827priorityCriticalpatent/US20020095586A1/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATIONreassignmentINTERNATIONAL BUSINESS MACHINES CORPORATIONASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: DOYLE, RONALD P., HIND, JOHN R., PETERS, MARCIA L.
Publication of US20020095586A1publicationCriticalpatent/US20020095586A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A method, system, computer program product, and method of doing business by improving security of a computing device. Continuous authentication of a user of the computing device, which may be (for example) a portable or personal computing device (also known as a “pervasive computing device”), is performed. The disclosed techniques also improve the security of operations or transactions carried out with such computing devices. Biometric sensors are preferably used for obtaining identifying information from users of computing devices, and this obtained information is compared to previously-stored biometric information which identifies the legitimate owner of the device. If the information matches, then it can be assumed that this user is the device owner, and a security-sensitive transaction is allowed to proceed so long as the biometric input is uninterrupted. Otherwise, when the obtained information does not match, or when there is an interruption in the biometric input, then the device may be in the wrongful possession of an impostor. A transaction may therefore be prevented or aborted, or in other cases perhaps simply marked as suspect or not authenticated; or, it may be desirable to completely deactivate the computing device.

Description

Claims (105)

We claim:
1. A system for providing continuous authentication of a user of a computing device, comprising:
a security component which provides security functions, such that the security component can vouch for authenticity of one or more other components with which it is securely operably connected;
a biometric sensor component that is securely operably connected, as one of the one or more other components, to the security component;
securely-stored biometric information which identifies an owner of the computing device;
means for repeatedly obtaining, from the biometric sensor component, biometric input of a user of the computing device; and
means for comparing the repeatedly obtained biometric input to the securely-stored biometric information of the owner, wherein each of the comparisons comprises an authentication of the user.
2. The system according toclaim 1, wherein the means for repeatedly obtaining is activated upon beginning a security-sensitive operation and is terminated upon completion of the security-sensitive operation.
3. The system according toclaim 1, wherein the means for repeatedly obtaining is activated each time a predetermined time interval elapses.
4. The system according toclaim 3, wherein the predetermined time interval is selectively configured by the owner of the computing device.
5. The system according toclaim 1, wherein the means for repeatedly obtaining is activated upon switching between functions of the computing device.
6. The system according toclaim 1, wherein the means for repeatedly obtaining is activated upon switching between functions of an application that is executing a security-sensitive operation using the computing device.
7. The system according toclaim 1, wherein the means for repeatedly obtaining is activated when the biometric sensor component detects one or more of an interruption, change, or loss of the biometric input.
8. The system according toclaim 1, wherein the means for repeatedly obtaining is activated upon reaching one of at least one predetermined instructions in an application that is executing a security-sensitive operation using the computing device.
9. The system according toclaim 1, wherein the biometric sensor component is securely operably connected to the security component when the security component is manufactured.
10. The system according toclaim 1, wherein the other components comprise one or more of (1) input/output components and (2) application processing components.
11. The system according toclaim 1, wherein the means for securely operably connecting further comprises means for authenticating the biometric sensor component to the security component.
12. The system according toclaim 11, further comprising means for authenticating the security component to the biometric sensor component.
13. The system according toclaim 1, wherein the means for securely operably connecting is activated by a hardware reset of the biometric sensor component, and wherein the hardware reset is activated by operably connecting of the biometric sensor component.
14. The system according toclaim 11, wherein the means for authenticating the biometric sensor component is securely stored thereon.
15. The system according toclaim 11, wherein the means for authenticating further comprises means for using public key cryptography.
16. The system according toclaim 1, further comprising means for concluding that the user is the owner of the computing device only if the means for comparing succeeds.
17. The system according toclaim 1, wherein the biometric sensor component is a fingerprint sensor, and wherein the fingerprint sensor is capable of repeatedly obtaining a fingerprint of the user as the biometric input of the user while the computing device is being held by the user.
18. The system according toclaim 1, wherein the biometric sensor component is a retina scanner, and wherein the retina scanner is capable of repeatedly obtaining a retinal scan of the user as the biometric input of the user while the user is looking at the computing device.
19. The system according toclaim 1, wherein the means for comparing is performed by the biometric sensor component.
20. The system according toclaim 19, further comprising means for securely transferring the securely-stored biometric information of the owner to the biometric sensor component for use by the means for comparing.
21. The system according toclaim 1, wherein the means for comparing is performed by the security component.
22. The system according toclaim 2, further comprising means for aborting the security-sensitive operation if the means for repeatedly obtaining or the means for comparing fails to detect the biometric information of the user, thereby causing the completion of the security-sensitive operation.
23. The system according toclaim 2, further comprising means for marking the security-sensitive operation as not authenticated if the means for repeatedly obtaining or the means for comparing fails to detect the biometric information of the user.
24. The system according toclaim 2, further comprising means for deactivating the computing device if the means for repeatedly obtaining or the means for comparing fails to detect the biometric information of the user.
25. The system according toclaim 2, further comprising means for concluding that the security-sensitive operation is authentic if the means for comparing succeeds until completion of the security-sensitive operation.
26. The system according toclaim 25, wherein the means for concluding that the security-sensitive operation is authentic also requires that all other components which are securely operably connected to the security core remain securely operably connected until completion of the security-sensitive operation.
27. The system according toclaim 25, wherein the means for concluding that the security-sensitive operation is authentic also requires that all other components which are securely operably connected to the security core and which are involved in the security-sensitive operation remain securely operably connected until completion thereof.
28. The system according toclaim 11, wherein the means for authenticating further comprises means for performing a security handshake between the biometric sensor component and the security component.
29. The system according toclaim 11, wherein the biometric sensor component has associated therewith a unique device identifier that is used to identify data originating therefrom, a digital certificate, a private cryptographic key and a public cryptographic key that is cryptographically-associated with the private cryptographic key.
30. The system according toclaim 1, wherein the biometric sensor component is physically integrated with a card, and wherein a card reader adapted to reading the card is securely operably connected to the security component.
31. The system according toclaim 1 orclaim 30, further comprising:
previously-stored secrets of the owner of the computing device; and
means for accessing selected ones of the previously-stored secrets only if the means for comparing determines, over a duration of a security-sensitive operation, that the obtained biometric input of the user matches the securely-stored biometric information of the owner.
32. The system according toclaim 31, wherein the previously-stored secrets include a private cryptographic key of the owner, and wherein the means for accessing further comprises means for accessing the private key to compute a digital signature over information pertaining to the security-sensitive operation.
33. The system according toclaim 1, wherein the means for repeatedly obtaining is activated continually during an interval of a security-sensitive operation being performed with the computing device.
34. The system according toclaim 11, wherein the means for authenticating further comprises means for using (1) a unique identifier of the biometric sensor component, (2) a digital signature computed over the unique identifier using a private cryptographic key of the biometric sensor component, and (3) a public key that is cryptographically associated with the private key.
35. A method for providing continuous authentication of a user of a computing device, comprising steps of:
operating a security component which provides security functions, such that the security component can vouch for authenticity of one or more other components with which it is securely operably connected;
providing a biometric sensor component that is securely operably connected, as one of the one or more other components, to the security component;
providing securely-stored biometric information which identifies an owner of the computing device;
repeatedly obtaining, from the biometric sensor component, biometric input of a user of the computing device; and
comparing the repeatedly obtained biometric input to the securely-stored biometric information of the owner, wherein each of the comparisons comprises an authentication of the user.
36. The method according toclaim 35, wherein the step of repeatedly obtaining is activated upon beginning a security-sensitive operation and is terminated upon completion of the security-sensitive operation.
37. The method according toclaim 35, wherein the step of repeatedly obtaining is activated each time a predetermined time interval elapses.
38. The method according toclaim 37, wherein the predetermined time interval is selectively configured by the owner of the computing device.
39. The method according toclaim 35, wherein the step of repeatedly obtaining is activated upon switching between functions of the computing device.
40. The method according toclaim 35, wherein the step of repeatedly obtaining is activated upon switching between functions of an application that is executing a security-sensitive operation using the computing device.
41. The method according toclaim 35, wherein the step of repeatedly obtaining is activated when the biometric sensor component detects one or more of an interruption, change, or loss of the biometric input.
42. The method according toclaim 35, wherein the step of repeatedly obtaining is activated upon reaching one of at least one predetermined instructions in an application that is executing a security-sensitive operation using the computing device.
43. The method according toclaim 35, wherein the biometric sensor component is securely operably connected to the security component when the security component is manufactured.
44. The method according toclaim 35, wherein the other components comprise one or more of (1) input/output components and (2) application processing components.
45. The method according toclaim 35, wherein the step of securely operably connecting further comprises the step of authenticating the biometric sensor component to the security component.
46. The method according toclaim 45, further comprising the step of authenticating the security component to the biometric sensor component.
47. The method according toclaim 35, wherein the step of securely operably connecting is activated by a hardware reset of the biometric sensor component, and wherein the hardware reset is activated by operably connecting of the biometric sensor component.
48. The method according toclaim 45, wherein instructions to perform the step of authenticating the biometric sensor component are securely stored thereon.
49. The method according toclaim 45, wherein the step of authenticating further comprises the step of using public key cryptography.
50. The method according toclaim 35, further comprising the step of concluding that the user is the owner of the computing device only if the comparing step succeeds.
51. The method according toclaim 35, wherein the biometric sensor component is a fingerprint sensor, and wherein the fingerprint sensor is capable of repeatedly obtaining a fingerprint of the user as the biometric input of the user while the computing device is being held by the user.
52. The method according toclaim 35, wherein the biometric sensor component is a retina scanner, and wherein the retina scanner is capable of repeatedly obtaining a retinal scan of the user as the biometric input of the user while the user is looking at the computing device.
53. The method according toclaim 35, wherein the comparing step is performed by the biometric sensor component.
54. The method according toclaim 53, further comprising the step of securely transferring the securely-stored biometric information of the owner to the biometric sensor component for use by the comparing step.
55. The method according toclaim 35, wherein the comparing step is performed by the security component.
56. The method according toclaim 36, further comprising the step of aborting the security-sensitive operation if the step of repeatedly obtaining or the comparing step fails to detect the biometric information of the user, thereby causing the completion of the security-sensitive operation.
57. The method according toclaim 36, further comprising the step of marking the security-sensitive operation as not authenticated if the step of repeatedly obtaining or the comparing step fails to detect the biometric information of the user.
58. The method according toclaim 36, further comprising the step of deactivating the computing device if the step of repeatedly obtaining or the comparing step fails to detect the biometric information of the user.
59. The method according toclaim 36, further comprising the step of concluding that the security-sensitive operation is authentic if the comparing step succeeds until completion of the security-sensitive operation.
60. The method according toclaim 59, wherein the step of concluding that the security-sensitive operation is authentic also requires that all other components which are securely operably connected to the security core remain securely operably connected until completion of the security-sensitive operation.
61. The method according toclaim 59, wherein the step of concluding that the security-sensitive operation is authentic also requires that all other components which are securely operably connected to the security core and which are involved in the security-sensitive operation remain securely operably connected until completion thereof.
62. The method according toclaim 45, wherein the step of authenticating further comprises the step of performing a security handshake between the biometric sensor component and the security component.
63. The method according toclaim 45, wherein the biometric sensor component has associated therewith a unique device identifier that is used to identify data originating therefrom, a digital certificate, a private cryptographic key and a public cryptographic key that is cryptographically-associated with the private cryptographic key.
64. The method according toclaim 35, wherein the biometric sensor component is physically integrated with a card, and wherein a card reader adapted to reading the card is securely operably connected to the security component.
65. The method according toclaim 35, further comprising steps of:
providing previously-stored secrets of the owner of the computing device; and
accessing selected ones of the previously-stored secrets only if the comparing step determines, over a duration of a security-sensitive operation, that the obtained biometric input of the user matches the securely-stored biometric information of the owner.
66. The method according toclaim 65, wherein the previously-stored secrets include a private cryptographic key of the owner, and wherein the accessing step further comprises the step of accessing the private key to compute a digital signature over information pertaining to the security-sensitive operation.
67. The method according toclaim 35, wherein the step of repeatedly obtaining is activated continually during an interval of a security-sensitive operation being performed with the computing device.
68. The method according toclaim 45, wherein the step of authenticating further comprises the step of using (1) a unique identifier of the biometric sensor component, (2) a digital signature computed over the unique identifier using a private cryptographic key of the biometric sensor component, and (3) a public key that is cryptographically associated with the private key.
69. A computer program product for providing continuous authentication of a user of a computing device, the computer program product embodied on one or more computer-readable media and comprising:
computer-readable program code means for operating a security component which provides security functions, such that the security component can vouch for authenticity of one or more other components with which it is securely operably connected;
computer-readable program code means for accessing a biometric sensor component that is securely operably connected, as one of the one or more other components, to the security component;
computer-readable program code means for accessing securely-stored biometric information which identifies an owner of the computing device;
computer-readable program code means for repeatedly obtaining, from the biometric sensor component, biometric input of a user of the computing device; and
computer-readable program code means for comparing the repeatedly obtained biometric input to the securely-stored biometric information of the owner, wherein each of the comparisons comprises an authentication of the user.
70. The computer program product according toclaim 69, wherein the computer-readable program code means for repeatedly obtaining is activated upon beginning a security-sensitive operation and is terminated upon completion of the security-sensitive operation.
71. The computer program product according toclaim 69, wherein the computer-readable program code means for repeatedly obtaining is activated each time a predetermined time interval elapses.
72. The computer program product according toclaim 71, wherein the predetermined time interval is selectively configured by the owner of the computing device.
73. The computer program product according toclaim 69, wherein the computer-readable program code means for repeatedly obtaining is activated upon switching between functions of the computing device.
74. The computer program product according toclaim 69, wherein the computer-readable program code means for repeatedly obtaining is activated upon switching between functions of an application that is executing a security-sensitive operation using the computing device.
75. The computer program product according toclaim 69, wherein the computer-readable program code means for repeatedly obtaining is activated when the biometric sensor component detects one or more of an interruption, change, or loss of the biometric input.
76. The computer program product according toclaim 69, wherein the computer-readable program code means for repeatedly obtaining is activated upon reaching one of at least one predetermined instructions in an application that is executing a security-sensitive operation using the computing device.
77. The computer program product according toclaim 69, wherein the biometric sensor component is securely operably connected to the security component when the security component is manufactured.
78. The computer program product according toclaim 69, wherein the other components comprise one or more of (1) input/output components and (2) application processing components.
79. The computer program product according toclaim 69, wherein the computer-readable program code means for securely operably connecting further comprises computer-readable program code means for authenticating the biometric sensor component to the security component.
80. The computer program product according toclaim 79, further comprising computer-readable program code means for authenticating the security component to the biometric sensor component.
81. The computer program product according toclaim 69, wherein the computer-readable program code means for securely operably connecting is activated by a hardware reset of the biometric sensor component, and wherein the hardware reset is activated by operably connecting of the biometric sensor component.
82. The computer program product according toclaim 79, wherein the computer-readable program code means for authenticating the biometric sensor component is securely stored thereon.
83. The computer program product according toclaim 79, wherein the computer-readable program code means for authenticating further comprises computer-readable program code means for using public key cryptography.
84. The computer program product according toclaim 69, further comprising computer-readable program code means for concluding that the user is the owner of the computing device only if the computer-readable program code means for comparing succeeds.
85. The computer program product according toclaim 69, wherein the biometric sensor component is a fingerprint sensor, and wherein the fingerprint sensor is capable of repeatedly obtaining a fingerprint of the user as the biometric input of the user while the computing device is being held by the user.
86. The computer program product according toclaim 69, wherein the biometric sensor component is a retina scanner, and wherein the retina scanner is capable of repeatedly obtaining a retinal scan of the user as the biometric input of the user while the user is looking at the computing device.
87. The computer program product according toclaim 69, wherein the computer-readable program code means for comparing is performed by the biometric sensor component.
88. The computer program product according toclaim 87, further comprising computer-readable program code means for securely transferring the securely-stored biometric information of the owner to the biometric sensor component for use by the computer-readable program code means for comparing.
89. The computer program product according toclaim 69, wherein the computer-readable program code means for comparing is performed by the security component.
90. The computer program product according toclaim 70, further comprising computer-readable program code means for aborting the security-sensitive operation if the computer-readable program code means for repeatedly obtaining or the computer-readable program code means for comparing fails to detect the biometric information of the user, thereby causing the completion of the security-sensitive operation.
91. The computer program product according toclaim 70, further comprising computer-readable program code means for marking the security-sensitive operation as not authenticated if the computer-readable program code means for repeatedly obtaining or the computer-readable program code means for comparing fails to detect the biometric information of the user.
92. The computer program product according toclaim 70, further comprising computer-readable program code means for deactivating the computing device if the computer-readable program code means for repeatedly obtaining or the computer-readable program code means for comparing fails to detect the biometric information of the user.
93. The computer program product according toclaim 70, further comprising computer-readable program code means for concluding that the security-sensitive operation is authentic if the computer-readable program code means for comparing succeeds until completion of the security-sensitive operation.
94. The computer program product according toclaim 93, wherein the computer-readable program code means for concluding that the security-sensitive operation is authentic also requires that all other components which are securely operably connected to the security core remain securely operably connected until completion of the security-sensitive operation.
95. The computer program product according toclaim 93, wherein the computer-readable program code means for concluding that the security-sensitive operation is authentic also requires that all other components which are securely operably connected to the security core and which are involved in the security-sensitive operation remain securely operably connected until completion thereof.
96. The computer program product according toclaim 79, wherein the computer-readable program code means for authenticating further comprises computer-readable program code means for performing a security handshake between the biometric sensor component and the security component.
97. The computer program product according toclaim 79, wherein the biometric sensor component has associated therewith a unique device identifier that is used to identify data originating therefrom, a digital certificate, a private cryptographic key and a public cryptographic key that is cryptographically-associated with the private cryptographic key.
98. The computer program product according toclaim 69, wherein the biometric sensor component is physically integrated with a card, and wherein a card reader adapted to reading the card is securely operably connected to the security component.
99. The computer program product according toclaim 98, further comprising:
computer-readable program code means for accessing previously-stored secrets of the owner of the computing device; and
computer-readable program code means for accessing selected ones of the previously-stored secrets only if the computer-readable program code means for comparing determines, over a duration of a security-sensitive operation, that the obtained biometric input of the user matches the securely-stored biometric information of the owner.
100. The computer program product according toclaim 99, wherein the previously-stored secrets include a private cryptographic key of the owner, and wherein the computer-readable program code means for accessing further comprises computer-readable program code means for accessing the private key to compute a digital signature over information pertaining to the security-sensitive operation.
101. The computer program product according toclaim 69, wherein the computer-readable program code means for repeatedly obtaining is activated continually during an interval of a security-sensitive operation being performed with the computing device.
102. The computer program product according toclaim 79, wherein the computer-readable program code means for authenticating further comprises computer-readable program code means for using (1) a unique identifier of the biometric sensor component, (2) a digital signature computed over the unique identifier using a private cryptographic key of the biometric sensor component, and (3) a public key that is cryptographically associated with the private key.
103. A method of doing business by continually authenticating a user of a computing device, comprising steps of:
operating a security component for the computing device, wherein the security component provides security functions such that the security component can vouch for authenticity of one or more other components with which it is securely operably connected;
providing a biometric sensor component that is securely operably connected, as one of the one or more other components, to the security component;
providing securely-stored biometric information which identifies an owner of the computing device;
performing a security-sensitive operation using the computing device;
repeatedly obtaining, from the biometric sensor component, biometric input of a user of the computing device over a duration of the security-sensitive operation;
comparing the repeatedly obtained biometric input to the securely-stored biometric information of the owner, wherein each of the comparisons comprises an authentication of the user; and
aborting the security-sensitive operation if the comparing step fails at any time over the duration of the security-sensitive operation.
104. A method of improving security of a computing device, comprising steps of:
operating a security component for the computing device, wherein the security component provides security functions such that the security component can vouch for authenticity of one or more other components with which it is securely operably connected;
providing a biometric sensor component that is securely operably connected, as one of the one or more other components, to the security component;
providing securely-stored biometric information which identifies an owner of the computing device;
repeatedly obtaining, from the biometric sensor component, biometric input of a user of the computing device; and
comparing the repeatedly obtained biometric input to the securely-stored biometric information of the owner.
105. A method of improving security of operations carried out with a computing device, comprising steps of:
operating a security component for the computing device, wherein the security component provides security functions such that the security component can vouch for authenticity of one or more other components with which it is securely operably connected;
providing a biometric sensor component that is securely operably connected, as one of the one or more other components, to the security component;
providing securely-stored biometric information which identifies an owner of the computing device;
performing a security-sensitive operation using the computing device;
repeatedly obtaining, from the biometric sensor component, biometric input of a user of the computing device over a duration of the security-sensitive operation;
comparing the repeatedly obtained biometric input to the securely-stored biometric information of the owner, wherein each of the comparisons comprises an authentication of the user; and
aborting the security-sensitive operation if the comparing step fails at any time over the duration of the security-sensitive operation.
US09/764,8272001-01-172001-01-17Technique for continuous user authenticationAbandonedUS20020095586A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US09/764,827US20020095586A1 (en)2001-01-172001-01-17Technique for continuous user authentication

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US09/764,827US20020095586A1 (en)2001-01-172001-01-17Technique for continuous user authentication

Publications (1)

Publication NumberPublication Date
US20020095586A1true US20020095586A1 (en)2002-07-18

Family

ID=25071899

Family Applications (1)

Application NumberTitlePriority DateFiling Date
US09/764,827AbandonedUS20020095586A1 (en)2001-01-172001-01-17Technique for continuous user authentication

Country Status (1)

CountryLink
US (1)US20020095586A1 (en)

Cited By (182)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20020122564A1 (en)*2001-03-052002-09-05Rhoads Geoffrey B.Using embedded identifiers with images
US20020135600A1 (en)*2001-03-052002-09-26Rhoads Geoffrey B.Geographically watermarked imagery and methods
US20020147910A1 (en)*2001-03-052002-10-10Brundage Trent J.Digitally watermarked maps and signs and related navigational tools
US20020184500A1 (en)*2001-05-292002-12-05Michael MaritzenSystem and method for secure entry and authentication of consumer-centric information
US20030053654A1 (en)*1994-03-172003-03-20Patterson Philip R.Hiding geo-location data through arrangement of objects
US20030061488A1 (en)*2001-09-252003-03-27Michael HueblerCloning protection for electronic equipment
US20030215110A1 (en)*2001-03-052003-11-20Rhoads Geoffrey B.Embedding location data in video
US6664976B2 (en)2001-04-182003-12-16Digimarc CorporationImage management system and methods using digital watermarks
US20040005058A1 (en)*2002-07-062004-01-08Kyung-Hun JangCryptographic method using dual encryption keys and a wireless local area network (LAN) system therefor
US20040008866A1 (en)*2001-03-052004-01-15Rhoads Geoffrey B.Geographic information systems using digital watermarks
US20040046774A1 (en)*2001-03-052004-03-11Rhoads Geoffrey B.Image management system and methods using digital watermarks
US20040098740A1 (en)*2000-12-072004-05-20Maritzen L. MichaelMethod and apparatus for using a kiosk and a transaction device in an electronic commerce system
US20040161131A1 (en)*2001-03-052004-08-19Rhoads Geoffrey B.Geo-referencing of aerial imagery using embedded image identifiers
US20040249825A1 (en)*2003-06-052004-12-09International Business Machines CorporationAdministering devices with dynamic action lists
US20050050137A1 (en)*2003-08-292005-03-03International Business Machines CorporationAdministering devices in dependence upon metric patterns
US20050071635A1 (en)*2003-09-252005-03-31Junko FuruyamaApparatus and a method for preventing unauthorized use and a device with a function of preventing unauthorized use
US20050071463A1 (en)*2003-09-302005-03-31Ibm CorporationAdministering devices in dependence upon device content metadata
US20050071462A1 (en)*2003-09-302005-03-31Ibm CorporationCreating user metric patterns
US20050091384A1 (en)*2003-10-232005-04-28International Business Machines CorporationAdministering devices including allowed action lists
US20050097361A1 (en)*2003-10-312005-05-05John ApostolopoulosMethod and apparatus for ensuring the integrity of data
US20050102120A1 (en)*2003-10-232005-05-12International Business Machines CorporationEvaluating test actions
US20050108366A1 (en)*2003-07-022005-05-19International Business Machines CorporationAdministering devices with domain state objects
US20050108429A1 (en)*2003-10-232005-05-19International Business Machines CorporationDevices in a domain
US20050108405A1 (en)*2003-10-232005-05-19International Business Machines CorporationCreating user metric patterns including user notification
US20050226468A1 (en)*2004-03-302005-10-13Intel CorporationMethod and apparatus for enabling context awareness in a wireless system
US20060059201A1 (en)*2004-09-142006-03-16Yoshikazu WatanabeMultimedia recording apparatus, object-specifying information providing apparatus, server apparatus, verification apparatus, multimedia recording method, object-specifying information providing method, server method, verification method, and multimedia recording system
EP1646254A1 (en)*2004-10-112006-04-12Swisscom Mobile AGIdentification and/or authentification method by means of fingerprints
US20060107040A1 (en)*2004-11-182006-05-18Michael FiskeSetting up a security access system
US20060107309A1 (en)*2004-11-182006-05-18Michael FiskeUsing an access key
US20060107312A1 (en)*2004-11-182006-05-18Michael FiskeSystem for handing requests for access to a passcode protected entity
US20060107316A1 (en)*2004-11-182006-05-18Michael FiskeDetermining whether to grant access to a passcode protected system
US20060107315A1 (en)*2004-11-182006-05-18Michael FiskeSystem that uses access keys
US20060117188A1 (en)*2004-11-182006-06-01Bionopoly LlcBiometric print quality assurance
US7098931B2 (en)2001-03-052006-08-29Digimarc CorporationImage management system and methods using digital watermarks
EP1703441A1 (en)*2005-03-152006-09-20Omron CorporationPhotographic subject authenticating device, portable telephone, photographic subject authenticating method and photographic subject authenticating program
US20060238789A1 (en)*2005-04-202006-10-26Xerox CorporationSystem and method for controlling access to programming options of a multifunction device
US7131132B1 (en)*2001-06-112006-10-31Lucent Technologies Inc.Automatic access denial
US7151969B2 (en)2003-06-262006-12-19International Business Machines CorporationAdministering devices in dependence upon user metric vectors with optimizing metric action lists
US20070016940A1 (en)*2005-07-082007-01-18Jdi Ventures, Inc. D/B/A Peak Performance SolutionsIdentification and password management device
US7197366B2 (en)2003-05-152007-03-27International Business Machines CorporationMethod and system for administering devices including an action log
US20070081696A1 (en)*2005-09-222007-04-12Technology Licensing CorporationBiometric control for kitchen appliance
US20070133846A1 (en)*2004-02-122007-06-14Precise Biometrics AbPortable data carrier, external arrangement, system and methods for wireless data transfer
WO2006091301A3 (en)*2005-01-242007-08-09Bionopoly LlcPasscodes
US20070241187A1 (en)*2006-04-182007-10-18Dean AlderucciSystems and methods for providing access to wireless gaming devices
US20070250561A1 (en)*2003-04-172007-10-25Bodin William KMethod And System For Administering Devices With Multiple User Metric Spaces
US20070288622A1 (en)*2003-07-022007-12-13Bodin William KAdministering Devices With Domain State Objects
US20070287893A1 (en)*2003-04-172007-12-13Bodin William KMethod And System For Administering Devices In Dependence Upon User Metric Vectors
US20070288493A1 (en)*2003-06-052007-12-13International Business Machines CorporationAdministering Devices Including Creating A User Reaction Log
US20080046750A1 (en)*2006-08-182008-02-21Associated Network Solutions PlcAuthentication method
US20080092209A1 (en)*2006-06-142008-04-17Davis Charles F LUser authentication system
US20080092245A1 (en)*2006-09-152008-04-17Agent Science Technologies, Inc.Multi-touch device behaviormetric user authentication and dynamic usability system
US20080091453A1 (en)*2006-07-112008-04-17Meehan Timothy EBehaviormetrics application system for electronic transaction authorization
US20080091639A1 (en)*2006-06-142008-04-17Davis Charles F LSystem to associate a demographic to a user of an electronic system
US20080098456A1 (en)*2006-09-152008-04-24Agent Science Technologies, Inc.Continuous user identification and situation analysis with identification of anonymous users through behaviormetrics
US7386863B2 (en)2003-06-262008-06-10International Business Machines CorporationAdministering devices in dependence upon user metric vectors with multiple users
US20080183820A1 (en)*2007-01-292008-07-31Fuji Xerox Co., Ltd.Device Orchestration
US20080276092A1 (en)*2004-05-142008-11-06Kurt EberhardtMethod for Authentication of Sensor Data, and an Associated Sensor
US20080288786A1 (en)*2004-12-202008-11-20Michael Stephen FiskeSystem with access keys
US7464062B2 (en)2003-06-262008-12-09International Business Machines CorporationAdministering devices in dependence upon user metric vectors including generic metric spaces
US20090031140A1 (en)*2002-08-062009-01-29Abdallah David SMethods for secure enrollment of personal identity credentials into electronic devices
US20090125982A1 (en)*2007-11-132009-05-14Yutaka HirataComputer system for port forwarding
US7549576B2 (en)2006-05-052009-06-23Cfph, L.L.C.Systems and methods for providing access to wireless gaming devices
US20090178115A1 (en)*2004-11-182009-07-09Michael Stephen FiskeReceiving an access key
US20090228714A1 (en)*2004-11-182009-09-10Biogy, Inc.Secure mobile device with online vault
US20090279851A1 (en)*2008-04-092009-11-12Sony CorporationCaptured image data management method and image capturing apparatus
US20090284347A1 (en)*2008-05-152009-11-19International Business Machines CorporationIdentity verification badge and method for utilizing same in a security system
US7637810B2 (en)2005-08-092009-12-29Cfph, LlcSystem and method for wireless gaming system with alerts
US20100011222A1 (en)*2004-11-182010-01-14Michael FiskeInterfacing with a system that includes a passcode authenticator
US20100077454A1 (en)*2007-08-012010-03-25China Iwncomm Co., LtdTrusted network connect method based on tri-element peer authentication
US7707622B2 (en)2004-11-182010-04-27Biogy, Inc.API for a system having a passcode authenticator
ITPD20100088A1 (en)*2010-03-192010-06-18Antonio Maritan MANAGEMENT OF TELEMATIC TRANSACTIONS BY "STRONG" AUTHENTICATION OF THE USER'S IDENTITY. B.OTP-SA SYSTEM - BIOMETRIC ONE-TIME-PASSWORD STRONG AUTHENTICATION (STRONG AUTHENTICATION WITH BETWEEN BIOMETRIC AND ETHERPORIAN PASSWORD).
US7811172B2 (en)2005-10-212010-10-12Cfph, LlcSystem and method for wireless lottery
US20100306054A1 (en)*2009-05-282010-12-02Drake Robert AMethod and apparatus for generating advertisements
US7886155B2 (en)2004-12-202011-02-08Biogy, Inc.System for generating requests to a passcode protected entity
US20110075011A1 (en)*2002-04-192011-03-31Abebe Muguleta SReal-Time Remote Image Capture System
EP1925113A4 (en)*2005-09-162011-05-04Tara Chand SinghalSystems and methods for multi-factor remote user authentication
US7979716B2 (en)2004-11-182011-07-12Biogy, Inc.Method of generating access keys
US8023691B2 (en)2001-04-242011-09-20Digimarc CorporationMethods involving maps, imagery, video and steganography
US8070604B2 (en)2005-08-092011-12-06Cfph, LlcSystem and method for providing wireless gaming as a service application
US8092303B2 (en)2004-02-252012-01-10Cfph, LlcSystem and method for convenience gaming
US8162756B2 (en)2004-02-252012-04-24Cfph, LlcTime and location based gaming
US8292741B2 (en)2006-10-262012-10-23Cfph, LlcApparatus, processes and articles for facilitating mobile gaming
US8319601B2 (en)2007-03-142012-11-27Cfph, LlcGame account access device
WO2012135681A3 (en)*2011-03-302012-11-29Qualcomm IncorporatedContinuous voice authentication for a mobile device
US20130061303A1 (en)*2010-02-252013-03-07Idondemand, Inc.Authentication System and Method in a Contactless Environment
WO2012166979A3 (en)*2011-05-312013-03-28Cleankeys Inc.System for detecting a user on a sensor-based surface
US20130085941A1 (en)*2008-09-302013-04-04Apple Inc.Systems and methods for secure wireless financial transactions
US8504617B2 (en)2004-02-252013-08-06Cfph, LlcSystem and method for wireless gaming with location determination
US8510567B2 (en)2006-11-142013-08-13Cfph, LlcConditional biometric access in a gaming environment
US8581721B2 (en)2007-03-082013-11-12Cfph, LlcGame access device with privileges
US8584222B2 (en)2010-10-012013-11-12Hid Global GmbhSecure pin reset process
US8613658B2 (en)2005-07-082013-12-24Cfph, LlcSystem and method for wireless gaming system with user profiles
US20140007185A1 (en)*2012-06-292014-01-02Apple Inc.Automatic Association of Authentication Credentials with Biometrics
US20140006795A1 (en)*2012-06-292014-01-02Apple Inc.Continual Authorization for Secured Functions
US8645709B2 (en)2006-11-142014-02-04Cfph, LlcBiometric access data encryption
US20140089680A1 (en)*2004-06-302014-03-27Fujitsu Semiconductor LimitedSecure processor and a program for a secure processor
US8784197B2 (en)2006-11-152014-07-22Cfph, LlcBiometric access sensitivity
US8826368B2 (en)2009-04-282014-09-02China Iwncomm Co., Ltd.Platform authentication method suitable for trusted network connect architecture based on tri-element peer authentication
US8840018B2 (en)2006-05-052014-09-23Cfph, LlcDevice with time varying signal
US20140366158A1 (en)*2013-06-082014-12-11Apple, Inc.Using Biometric Verification to Grant Access to Redacted Content
US8956231B2 (en)2010-08-132015-02-17Cfph, LlcMulti-process communication regarding gaming information
US20150066762A1 (en)*2013-08-282015-03-05Geoffrey W. ChattertonAuthentication system
US8974302B2 (en)2010-08-132015-03-10Cfph, LlcMulti-process communication regarding gaming information
US20150082890A1 (en)*2013-09-262015-03-26Intel CorporationBiometric sensors for personal devices
US9069390B2 (en)2008-09-192015-06-30Typesoft Technologies, Inc.Systems and methods for monitoring surface sanitation
US9104260B2 (en)2012-04-102015-08-11Typesoft Technologies, Inc.Systems and methods for detecting a press on a touch-sensitive surface
US9110590B2 (en)2007-09-192015-08-18Typesoft Technologies, Inc.Dynamically located onscreen keyboard
US9128981B1 (en)2008-07-292015-09-08James L. GeerPhone assisted ‘photographic memory’
US9183693B2 (en)2007-03-082015-11-10Cfph, LlcGame access device
US20150324116A1 (en)*2007-09-192015-11-12Apple Inc.Systems and methods for detecting a press on a touch-sensitive surface
US9268928B2 (en)2014-04-062016-02-23International Business Machines CorporationSmart pen system to restrict access to security sensitive devices while continuously authenticating the user
US9306952B2 (en)2006-10-262016-04-05Cfph, LlcSystem and method for wireless gaming with location determination
US20160171200A1 (en)*2004-12-202016-06-16Proxense, LlcBiometric Personal Data Key (PDK) Authentication
EP3038298A1 (en)*2014-12-232016-06-29Telefonica Digital España, S.L.U.A computer-implemented method for protecting classified content on a computing device and computer programs thereof
US9454270B2 (en)2008-09-192016-09-27Apple Inc.Systems and methods for detecting a press on a touch-sensitive surface
US9489086B1 (en)2013-04-292016-11-08Apple Inc.Finger hover detection for improved typing
US20170192482A1 (en)*2015-12-312017-07-06Motorola Mobility LlcFingerprint Sensor With Power Saving Operating Modes, and Corresponding Devices, Systems, and Methods
US9792361B1 (en)2008-07-292017-10-17James L. GeerPhotographic memory
US9819676B2 (en)2012-06-292017-11-14Apple Inc.Biometric capture for unauthorized user identification
US9959539B2 (en)*2012-06-292018-05-01Apple Inc.Continual authorization for secured functions
US9979721B2 (en)*2013-04-112018-05-22Tencent Technology (Shenzhen) Company LimitedMethod, server, client and system for verifying verification codes
US10057072B2 (en)*2014-12-312018-08-21Schneider Electric USA, Inc.Industrial network certificate recovery by identifying secondary root certificate
US20180288040A1 (en)*2013-09-252018-10-04Jpmorgan Chase Bank, N.A.System and Method for Biometric Authentication-Based Electronic Notary Public
US10118099B2 (en)2014-12-162018-11-06Activision Publishing, Inc.System and method for transparently styling non-player characters in a multiplayer video game
US10203873B2 (en)2007-09-192019-02-12Apple Inc.Systems and methods for adaptively presenting a keyboard on a touch-sensitive display
US20190050549A1 (en)*2016-02-102019-02-14Grad Dna Ltd.A method and system for identification verification for mobile devices
US10212158B2 (en)*2012-06-292019-02-19Apple Inc.Automatic association of authentication credentials with biometrics
US20190087557A1 (en)*2017-09-182019-03-21Dov MoranSystem, device and method for logging-in by staring at a display device
DE102012220130B4 (en)2011-11-202019-04-04International Business Machines Corporation Procedure and system for granting access to secure facilities
US10284454B2 (en)2007-11-302019-05-07Activision Publishing, Inc.Automatic increasing of capacity of a virtual space in a virtual world
US10289302B1 (en)2013-09-092019-05-14Apple Inc.Virtual keyboard animation
US10286326B2 (en)2014-07-032019-05-14Activision Publishing, Inc.Soft reservation system and method for multiplayer video games
US10296998B2 (en)*2016-11-102019-05-21Mcafee, LlcOptical feedback for visual recognition authentication
US10315113B2 (en)2015-05-142019-06-11Activision Publishing, Inc.System and method for simulating gameplay of nonplayer characters distributed across networked end user devices
US10331866B2 (en)2013-09-062019-06-25Apple Inc.User verification for changing a setting of an electronic device
US10376793B2 (en)2010-02-182019-08-13Activision Publishing, Inc.Videogame system and method that enables characters to earn virtual fans by completing secondary objectives
US10421019B2 (en)2010-05-122019-09-24Activision Publishing, Inc.System and method for enabling players to participate in asynchronous, competitive challenges
US10433787B2 (en)2014-07-072019-10-083M Electronic Monitoring LtdSelf-administered tamper-evident drug detection
US10460566B2 (en)2005-07-082019-10-29Cfph, LlcSystem and method for peer-to-peer wireless gaming
WO2019212263A1 (en)*2018-05-022019-11-07Samsung Electronics Co., Ltd.System and method for resource access authentication
US10471348B2 (en)2015-07-242019-11-12Activision Publishing, Inc.System and method for creating and sharing customized video game weapon configurations in multiplayer video games via one or more social networks
US20190370446A1 (en)*2014-02-042019-12-05Lenovo (Singapore) Pte. Ltd.Biometric account card
US10500498B2 (en)2016-11-292019-12-10Activision Publishing, Inc.System and method for optimizing virtual games
US10561945B2 (en)2017-09-272020-02-18Activision Publishing, Inc.Methods and systems for incentivizing team cooperation in multiplayer gaming environments
CN111049978A (en)*2014-12-302020-04-21小米科技有限责任公司Notification information display method and device
US10627983B2 (en)2007-12-242020-04-21Activision Publishing, Inc.Generating data for managing encounters in a virtual world environment
US10735412B2 (en)2014-01-312020-08-04Apple Inc.Use of a biometric image for authorization
US10764044B1 (en)*2006-05-052020-09-01Proxense, LlcPersonal digital key initialization and registration for secure transactions
US10765948B2 (en)2017-12-222020-09-08Activision Publishing, Inc.Video game content aggregation, normalization, and publication systems and methods
US10769939B2 (en)2007-11-092020-09-08Proxense, LlcProximity-sensor supporting multiple application services
US10817935B1 (en)*2015-07-022020-10-27Jpmorgan Chase Bank, N.A.System and method for increasing credit worthiness of account holders
US10868672B1 (en)2015-06-052020-12-15Apple Inc.Establishing and verifying identity using biometrics while protecting user privacy
US10909229B2 (en)2013-05-102021-02-02Proxense, LlcSecure element as a digital pocket
US10943471B1 (en)2006-11-132021-03-09Proxense, LlcBiometric authentication using proximity and secure information on a user device
US10971251B1 (en)2008-02-142021-04-06Proxense, LlcProximity-based healthcare management system with automatic access to private information
US10974150B2 (en)2017-09-272021-04-13Activision Publishing, Inc.Methods and systems for improved content customization in multiplayer gaming environments
US11040286B2 (en)2017-09-272021-06-22Activision Publishing, Inc.Methods and systems for improved content generation in multiplayer gaming environments
US11080378B1 (en)2007-12-062021-08-03Proxense, LlcHybrid device having a personal digital key and receiver-decoder circuit and methods of use
US11086979B1 (en)2007-12-192021-08-10Proxense, LlcSecurity system and method for controlling access to computing resources
US11095640B1 (en)2010-03-152021-08-17Proxense, LlcProximity-based system for automatic application or data access and item tracking
US11097193B2 (en)2019-09-112021-08-24Activision Publishing, Inc.Methods and systems for increasing player engagement in multiplayer gaming environments
US11100481B2 (en)*2010-10-142021-08-24Jpmorgan Chase Bank, N.A.Image authentication and security system and method
US11113482B1 (en)2011-02-212021-09-07Proxense, LlcImplementation of a proximity-based system for object tracking and automatic application initialization
US11120449B2 (en)2008-04-082021-09-14Proxense, LlcAutomated service-based order processing
US11140171B1 (en)2015-06-052021-10-05Apple Inc.Establishing and verifying identity using action sequences while protecting user privacy
US11206664B2 (en)2006-01-062021-12-21Proxense, LlcWireless network synchronization of cells and client devices on a network
US20220051256A1 (en)*2018-09-282022-02-17Nec CorporationServer, processing apparatus, and processing method
US11258791B2 (en)2004-03-082022-02-22Proxense, LlcLinked account system using personal digital key (PDK-LAS)
US11295758B2 (en)2020-03-202022-04-05Seagate Technology LlcTrusted listening
US11351459B2 (en)2020-08-182022-06-07Activision Publishing, Inc.Multiplayer video games with virtual characters having dynamically generated attribute profiles unconstrained by predefined discrete values
US11394705B2 (en)*2018-07-102022-07-19Ademco Inc.Systems and methods for verifying credentials to perform a secured operation in a connected system
US11443060B2 (en)*2019-10-292022-09-13Motorola Mobility LlcNote taking at a device based on whether the user is a known user, unknown user, or owner
US11524234B2 (en)2020-08-182022-12-13Activision Publishing, Inc.Multiplayer video games with virtual characters having dynamically modified fields of view
US11546325B2 (en)2010-07-152023-01-03Proxense, LlcProximity-based system for object tracking
US11553481B2 (en)2006-01-062023-01-10Proxense, LlcWireless network synchronization of cells and client devices on a network
US11676188B2 (en)2013-09-092023-06-13Apple Inc.Methods of authenticating a user
US11679330B2 (en)2018-12-182023-06-20Activision Publishing, Inc.Systems and methods for generating improved non-player characters
US11712627B2 (en)2019-11-082023-08-01Activision Publishing, Inc.System and method for providing conditional access to virtual gaming items
RU2825109C1 (en)*2023-09-262024-08-20ООО "Ф.А.К.К.Т Антифрод"Method and system for behavioral user profiling based on analysis of sensor signals of mobile device
US12284294B1 (en)*2023-01-042025-04-22Wells Fargo Bank, N.A.Authentication in metaverse
US12400518B2 (en)2006-05-052025-08-26Interactive Games LlcSystem for facilitating online wagering with nearby mobile phones
US12409382B2 (en)2010-08-132025-09-09Interactive Games LlcSmart phone with wrapper application that checks whether the smart phone may use a gambling application

Citations (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5229764A (en)*1991-06-201993-07-20Matchett Noel DContinuous biometric authentication matrix
US5319362A (en)*1990-06-141994-06-07Medeco Security Locks, Inc.Security system with security access database distributed among individual access devices
US6125192A (en)*1997-04-212000-09-26Digital Persona, Inc.Fingerprint recognition system
US6325285B1 (en)*1999-11-122001-12-04At&T Corp.Smart card with integrated fingerprint reader
US6330670B1 (en)*1998-10-262001-12-11Microsoft CorporationDigital rights management operating system
US6547130B1 (en)*1999-06-032003-04-15Ming-Shiang ShenIntegrated circuit card with fingerprint verification capability
US6577733B1 (en)*1999-12-032003-06-10Smart Card Integrators, Inc.Method and system for secure cashless gaming

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5319362A (en)*1990-06-141994-06-07Medeco Security Locks, Inc.Security system with security access database distributed among individual access devices
US5229764A (en)*1991-06-201993-07-20Matchett Noel DContinuous biometric authentication matrix
US6125192A (en)*1997-04-212000-09-26Digital Persona, Inc.Fingerprint recognition system
US6330670B1 (en)*1998-10-262001-12-11Microsoft CorporationDigital rights management operating system
US6547130B1 (en)*1999-06-032003-04-15Ming-Shiang ShenIntegrated circuit card with fingerprint verification capability
US6325285B1 (en)*1999-11-122001-12-04At&T Corp.Smart card with integrated fingerprint reader
US6577733B1 (en)*1999-12-032003-06-10Smart Card Integrators, Inc.Method and system for secure cashless gaming

Cited By (391)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20030053654A1 (en)*1994-03-172003-03-20Patterson Philip R.Hiding geo-location data through arrangement of objects
US6993152B2 (en)1994-03-172006-01-31Digimarc CorporationHiding geo-location data through arrangement of objects
US20040098740A1 (en)*2000-12-072004-05-20Maritzen L. MichaelMethod and apparatus for using a kiosk and a transaction device in an electronic commerce system
US8027506B2 (en)2001-03-052011-09-27Digimarc CorporationGeographical encoding imagery and video
US7502490B2 (en)2001-03-052009-03-10Digimarc CorporationGeographic information systems using digital watermarks
US20070052727A1 (en)*2001-03-052007-03-08Rhoads Geoffrey BDigital Watermarking Compressed Video Captured From Aerial Sensors
US20030215110A1 (en)*2001-03-052003-11-20Rhoads Geoffrey B.Embedding location data in video
US20020122564A1 (en)*2001-03-052002-09-05Rhoads Geoffrey B.Using embedded identifiers with images
US8447064B2 (en)2001-03-052013-05-21Digimarc CorporationProviding travel-logs based geo-locations relative to a graphical map
US20040008866A1 (en)*2001-03-052004-01-15Rhoads Geoffrey B.Geographic information systems using digital watermarks
US20040046774A1 (en)*2001-03-052004-03-11Rhoads Geoffrey B.Image management system and methods using digital watermarks
US20020147910A1 (en)*2001-03-052002-10-10Brundage Trent J.Digitally watermarked maps and signs and related navigational tools
US20040161131A1 (en)*2001-03-052004-08-19Rhoads Geoffrey B.Geo-referencing of aerial imagery using embedded image identifiers
US7650008B2 (en)2001-03-052010-01-19Digimarc CorporationDigital watermarking compressed video captured from aerial sensors
US20100016016A1 (en)*2001-03-052010-01-21Trent BrundageHandheld Devices and Methods for Extracting Data
US20070052730A1 (en)*2001-03-052007-03-08Patterson Phillip RImage management system and methods using digital watermarks
US7099492B2 (en)2001-03-052006-08-29Digimarc CorporationMethod of steganographically embedding geo-location data in media
US7992004B2 (en)2001-03-052011-08-02Digimarc CorporationDigital watermarked imagery, video, maps and signs
US8045749B2 (en)2001-03-052011-10-25Digimarc CorporationEmbedding location data in video
US7502489B2 (en)2001-03-052009-03-10Digimarc CorporationGeographically watermarked imagery and methods
US8135166B2 (en)2001-03-052012-03-13Digimarc CorporationEmbedding geo-location information in media
US7098931B2 (en)2001-03-052006-08-29Digimarc CorporationImage management system and methods using digital watermarks
US8023694B2 (en)2001-03-052011-09-20Digimarc CorporationSystems and methods using identifying data derived or extracted from video, audio or images
US20080123154A1 (en)*2001-03-052008-05-29Trent BrundageDigital Watermarking Maps and Signs, and Related Navigational Tools
US7184572B2 (en)2001-03-052007-02-27Digimarc CorporationUsing steganographic encoded information with maps
US7061510B2 (en)2001-03-052006-06-13Digimarc CorporationGeo-referencing of aerial imagery using embedded image identifiers and cross-referenced data sets
US7506169B2 (en)2001-03-052009-03-17Digimarc CorporationDigital watermarking maps and signs, and related navigational tools
US8085976B2 (en)2001-03-052011-12-27Digimarc CorporationDigital watermarking video captured from airborne platforms
US20020135600A1 (en)*2001-03-052002-09-26Rhoads Geoffrey B.Geographically watermarked imagery and methods
US20080025561A1 (en)*2001-03-052008-01-31Rhoads Geoffrey BEmbedding Location Data in Video
US7197160B2 (en)2001-03-052007-03-27Digimarc CorporationGeographic information systems using digital watermarks
US8127139B2 (en)2001-03-052012-02-28Digimarc CorporationHandheld devices and methods for extracting data
US20060072783A1 (en)*2001-03-052006-04-06Rhoads Geoffrey BGeographically watermarked imagery and methods
US9363409B2 (en)2001-03-052016-06-07Digimarc CorporationImage management system and methods using digital watermarks
US7254249B2 (en)2001-03-052007-08-07Digimarc CorporationEmbedding location data in video
US7042470B2 (en)2001-03-052006-05-09Digimarc CorporationUsing embedded steganographic identifiers in segmented areas of geographic images and characteristics corresponding to imagery data derived from aerial platforms
US7249257B2 (en)2001-03-052007-07-24Digimarc CorporationDigitally watermarked maps and signs and related navigational tools
US6950519B2 (en)2001-03-052005-09-27Digimarc CorporationGeographically watermarked imagery and methods
US6664976B2 (en)2001-04-182003-12-16Digimarc CorporationImage management system and methods using digital watermarks
US8976998B2 (en)2001-04-242015-03-10Digimarc CorporationMethods involving maps, imagery, video and steganography
US9792661B2 (en)2001-04-242017-10-17Digimarc CorporationMethods involving maps, imagery, video and steganography
US8023691B2 (en)2001-04-242011-09-20Digimarc CorporationMethods involving maps, imagery, video and steganography
US20020184500A1 (en)*2001-05-292002-12-05Michael MaritzenSystem and method for secure entry and authentication of consumer-centric information
US7131132B1 (en)*2001-06-112006-10-31Lucent Technologies Inc.Automatic access denial
US20030061488A1 (en)*2001-09-252003-03-27Michael HueblerCloning protection for electronic equipment
US8553950B2 (en)*2002-04-192013-10-08At&T Intellectual Property I, L.P.Real-time remote image capture system
US20110075011A1 (en)*2002-04-192011-03-31Abebe Muguleta SReal-Time Remote Image Capture System
US7835525B2 (en)*2002-07-062010-11-16Samsung Electronics Co., Ltd.Cryptographic method using dual encryption keys and a wireless local area network (LAN) system therefor
US20040005058A1 (en)*2002-07-062004-01-08Kyung-Hun JangCryptographic method using dual encryption keys and a wireless local area network (LAN) system therefor
US9979709B2 (en)2002-08-062018-05-22Apple Inc.Methods for secure restoration of personal identity credentials into electronic devices
US20090031140A1 (en)*2002-08-062009-01-29Abdallah David SMethods for secure enrollment of personal identity credentials into electronic devices
US20100005315A1 (en)*2002-08-062010-01-07Abdallah David SMethods for secure enrollment and backup of personal identity credentials into electronic devices
US8407480B2 (en)2002-08-062013-03-26Privaris, Inc.Methods for secure enrollment and backup of personal identity credentials into electronic devices
US8478992B2 (en)2002-08-062013-07-02Privaris, Inc.Methods for secure restoration of personal identity credentials into electronic devices
US8001372B2 (en)2002-08-062011-08-16Privaris, Inc.Methods for secure enrollment and backup of personal identity credentials into electronic devices
US8055906B2 (en)*2002-08-062011-11-08Privaris, Inc.Methods for secure restoration of personal identity credentials into electronic devices
US8826031B2 (en)2002-08-062014-09-02Privaris, Inc.Methods for secure enrollment and backup of personal identity credentials into electronic devices
US9716698B2 (en)2002-08-062017-07-25Apple Inc.Methods for secure enrollment and backup of personal identity credentials into electronic devices
US9160537B2 (en)2002-08-062015-10-13Apple Inc.Methods for secure restoration of personal identity credentials into electronic devices
US9270464B2 (en)2002-08-062016-02-23Apple Inc.Methods for secure enrollment and backup of personal identity credentials into electronic devices
US8127143B2 (en)2002-08-062012-02-28Privaris, Inc.Methods for secure enrollment of personal identity credentials into electronic devices
US20090037746A1 (en)*2002-08-062009-02-05Abdallah David SMethods for secure restoration of personal identity credentials into electronic devices
US7779114B2 (en)2003-04-172010-08-17International Business Machines CorporationMethod and system for administering devices with multiple user metric spaces
US20070250561A1 (en)*2003-04-172007-10-25Bodin William KMethod And System For Administering Devices With Multiple User Metric Spaces
US20070287893A1 (en)*2003-04-172007-12-13Bodin William KMethod And System For Administering Devices In Dependence Upon User Metric Vectors
US8112499B2 (en)2003-04-172012-02-07International Business Machines CorporationAdministering devices in dependence upon user metric vectors
US8180885B2 (en)2003-04-172012-05-15International Business Machines CorporationMethod and system for administering devices with multiple user metric spaces
US7197366B2 (en)2003-05-152007-03-27International Business Machines CorporationMethod and system for administering devices including an action log
US20070283266A1 (en)*2003-06-052007-12-06Bodin William KAdministering Devices With Dynamic Action Lists
US20040249825A1 (en)*2003-06-052004-12-09International Business Machines CorporationAdministering devices with dynamic action lists
US20070288493A1 (en)*2003-06-052007-12-13International Business Machines CorporationAdministering Devices Including Creating A User Reaction Log
US20080154945A1 (en)*2003-06-262008-06-26International Business Machines CorporationAdministering Devices In Dependence Upon User Metric Vectors With Multiple Users
US7464062B2 (en)2003-06-262008-12-09International Business Machines CorporationAdministering devices in dependence upon user metric vectors including generic metric spaces
US7151969B2 (en)2003-06-262006-12-19International Business Machines CorporationAdministering devices in dependence upon user metric vectors with optimizing metric action lists
US7386863B2 (en)2003-06-262008-06-10International Business Machines CorporationAdministering devices in dependence upon user metric vectors with multiple users
US7865909B2 (en)2003-06-262011-01-04International Business Machines CorporationAdministering devices in dependence upon user metric vectors with multiple users
US20070288622A1 (en)*2003-07-022007-12-13Bodin William KAdministering Devices With Domain State Objects
US8688818B2 (en)2003-07-022014-04-01International Business Machines CorporationAdministering devices with domain state objects
US8112509B2 (en)*2003-07-022012-02-07International Business Machines CorporationAdministering devices with domain state objects
US7437443B2 (en)2003-07-022008-10-14International Business Machines CorporationAdministering devices with domain state objects
US20050108366A1 (en)*2003-07-022005-05-19International Business Machines CorporationAdministering devices with domain state objects
US20090019457A1 (en)*2003-07-022009-01-15International Business Machines CorporationAdministering Devices With Domain State Objects
US20050050137A1 (en)*2003-08-292005-03-03International Business Machines CorporationAdministering devices in dependence upon metric patterns
US20050071635A1 (en)*2003-09-252005-03-31Junko FuruyamaApparatus and a method for preventing unauthorized use and a device with a function of preventing unauthorized use
EP1521161A3 (en)*2003-09-252006-03-15Matsushita Electric Industrial Co., Ltd.An apparatus and a method for preventing unauthorized use and a device with a function of preventing unauthorized use
US7647638B2 (en)2003-09-252010-01-12Panasonic CorporationApparatus and a method for preventing unauthorized use and a device with a function of preventing unauthorized use
US20050071463A1 (en)*2003-09-302005-03-31Ibm CorporationAdministering devices in dependence upon device content metadata
US20050071462A1 (en)*2003-09-302005-03-31Ibm CorporationCreating user metric patterns
US6961668B2 (en)2003-10-232005-11-01International Business Machines CorporationEvaluating test actions
US20050108405A1 (en)*2003-10-232005-05-19International Business Machines CorporationCreating user metric patterns including user notification
US20050091384A1 (en)*2003-10-232005-04-28International Business Machines CorporationAdministering devices including allowed action lists
US20050102120A1 (en)*2003-10-232005-05-12International Business Machines CorporationEvaluating test actions
US20090055533A1 (en)*2003-10-232009-02-26International Business Machines CorporationAdministering Devices Including Allowed Action Lists
US7912953B2 (en)2003-10-232011-03-22International Business Machines CorporationAdministering devices including allowed action lists
US7263511B2 (en)2003-10-232007-08-28International Business Machines CorporationCreating user metric patterns including user notification
US7461143B2 (en)2003-10-232008-12-02International Business Machines CorporationAdministering devices including allowed action lists
US20050108429A1 (en)*2003-10-232005-05-19International Business Machines CorporationDevices in a domain
US20050097361A1 (en)*2003-10-312005-05-05John ApostolopoulosMethod and apparatus for ensuring the integrity of data
US7558954B2 (en)*2003-10-312009-07-07Hewlett-Packard Development Company, L.P.Method and apparatus for ensuring the integrity of data
WO2005045653A1 (en)2003-10-312005-05-19Hewlett-Packard Development Company L.P.A method and apparatus for ensuring the integrity of data
US7961913B2 (en)*2004-02-122011-06-14Precise Biometrics AbPortable data carrier, external arrangement, system and methods for wireless data transfer
US20070133846A1 (en)*2004-02-122007-06-14Precise Biometrics AbPortable data carrier, external arrangement, system and methods for wireless data transfer
US9355518B2 (en)2004-02-252016-05-31Interactive Games LlcGaming system with location determination
US8696443B2 (en)2004-02-252014-04-15Cfph, LlcSystem and method for convenience gaming
US8504617B2 (en)2004-02-252013-08-06Cfph, LlcSystem and method for wireless gaming with location determination
US9430901B2 (en)2004-02-252016-08-30Interactive Games LlcSystem and method for wireless gaming with location determination
US10653952B2 (en)2004-02-252020-05-19Interactive Games LlcSystem and method for wireless gaming with location determination
US11514748B2 (en)2004-02-252022-11-29Interactive Games LlcSystem and method for convenience gaming
US8616967B2 (en)2004-02-252013-12-31Cfph, LlcSystem and method for convenience gaming
US10391397B2 (en)2004-02-252019-08-27Interactive Games, LlcSystem and method for wireless gaming with location determination
US8308568B2 (en)2004-02-252012-11-13Cfph, LlcTime and location based gaming
US10360755B2 (en)2004-02-252019-07-23Interactive Games LlcTime and location based gaming
US10726664B2 (en)2004-02-252020-07-28Interactive Games LlcSystem and method for convenience gaming
US8162756B2 (en)2004-02-252012-04-24Cfph, LlcTime and location based gaming
US10515511B2 (en)2004-02-252019-12-24Interactive Games LlcNetwork based control of electronic devices for gaming
US10347076B2 (en)2004-02-252019-07-09Interactive Games LlcNetwork based control of remote system for enabling, disabling, and controlling gaming
US8092303B2 (en)2004-02-252012-01-10Cfph, LlcSystem and method for convenience gaming
US11024115B2 (en)2004-02-252021-06-01Interactive Games LlcNetwork based control of remote system for enabling, disabling, and controlling gaming
US11922395B2 (en)2004-03-082024-03-05Proxense, LlcLinked account system using personal digital key (PDK-LAS)
US11258791B2 (en)2004-03-082022-02-22Proxense, LlcLinked account system using personal digital key (PDK-LAS)
US20050226468A1 (en)*2004-03-302005-10-13Intel CorporationMethod and apparatus for enabling context awareness in a wireless system
US20080276092A1 (en)*2004-05-142008-11-06Kurt EberhardtMethod for Authentication of Sensor Data, and an Associated Sensor
US9672384B2 (en)*2004-06-302017-06-06Socionext Inc.Secure processor and a program for a secure processor
US10095890B2 (en)2004-06-302018-10-09Socionext Inc.Secure processor and a program for a secure processor
US10685145B2 (en)2004-06-302020-06-16Socionext Inc.Secure processor and a program for a secure processor
US10303901B2 (en)2004-06-302019-05-28Socionext Inc.Secure processor and a program for a secure processor
US20140089680A1 (en)*2004-06-302014-03-27Fujitsu Semiconductor LimitedSecure processor and a program for a secure processor
US11550962B2 (en)2004-06-302023-01-10Socionext Inc.Secure processor and a program for a secure processor
US9536110B2 (en)2004-06-302017-01-03Socionext Inc.Secure processor and a program for a secure processor
US9652635B2 (en)2004-06-302017-05-16Socionext Inc.Secure processor and a program for a secure processor
US20060059201A1 (en)*2004-09-142006-03-16Yoshikazu WatanabeMultimedia recording apparatus, object-specifying information providing apparatus, server apparatus, verification apparatus, multimedia recording method, object-specifying information providing method, server method, verification method, and multimedia recording system
EP1641241A1 (en)*2004-09-142006-03-29Ricoh Company, Ltd.Multimedia recording apparatus,
US7783890B2 (en)2004-09-142010-08-24Ricoh Company, Ltd.Multimedia recording apparatus, object-specifying information providing apparatus, server apparatus, verification apparatus, multimedia recording method, object-specifying information providing method, server method, verification method, and multimedia recording system
US7673149B2 (en)2004-10-112010-03-02Swisscom AgIdentification and/or authentication method
US20060080525A1 (en)*2004-10-112006-04-13Swisscom Mobile AgIdentification and/or authentication method
EP1646254A1 (en)*2004-10-112006-04-12Swisscom Mobile AGIdentification and/or authentification method by means of fingerprints
US8209751B2 (en)2004-11-182012-06-26Biogy, Inc.Receiving an access key
US20060107040A1 (en)*2004-11-182006-05-18Michael FiskeSetting up a security access system
US20060107312A1 (en)*2004-11-182006-05-18Michael FiskeSystem for handing requests for access to a passcode protected entity
US20060107309A1 (en)*2004-11-182006-05-18Michael FiskeUsing an access key
US20060107316A1 (en)*2004-11-182006-05-18Michael FiskeDetermining whether to grant access to a passcode protected system
US7669236B2 (en)2004-11-182010-02-23Biogy, Inc.Determining whether to grant access to a passcode protected system
US20100011222A1 (en)*2004-11-182010-01-14Michael FiskeInterfacing with a system that includes a passcode authenticator
US20060107315A1 (en)*2004-11-182006-05-18Michael FiskeSystem that uses access keys
US7702911B2 (en)2004-11-182010-04-20Biogy, Inc.Interfacing with a system that includes a passcode authenticator
US7770018B2 (en)2004-11-182010-08-03Biogy, Inc.Setting up a security access system
US20060117188A1 (en)*2004-11-182006-06-01Bionopoly LlcBiometric print quality assurance
US7979716B2 (en)2004-11-182011-07-12Biogy, Inc.Method of generating access keys
US7707622B2 (en)2004-11-182010-04-27Biogy, Inc.API for a system having a passcode authenticator
US20090178115A1 (en)*2004-11-182009-07-09Michael Stephen FiskeReceiving an access key
US20090228714A1 (en)*2004-11-182009-09-10Biogy, Inc.Secure mobile device with online vault
US20160171200A1 (en)*2004-12-202016-06-16Proxense, LlcBiometric Personal Data Key (PDK) Authentication
US10698989B2 (en)*2004-12-202020-06-30Proxense, LlcBiometric personal data key (PDK) authentication
US20080288786A1 (en)*2004-12-202008-11-20Michael Stephen FiskeSystem with access keys
US7886155B2 (en)2004-12-202011-02-08Biogy, Inc.System for generating requests to a passcode protected entity
WO2006091301A3 (en)*2005-01-242007-08-09Bionopoly LlcPasscodes
US20060212718A1 (en)*2005-03-152006-09-21Omron CorporationPhotographic subject authenticating device, portable telephone, photographic subject authenticating method and photographic subject authenticating program
EP1703441A1 (en)*2005-03-152006-09-20Omron CorporationPhotographic subject authenticating device, portable telephone, photographic subject authenticating method and photographic subject authenticating program
US7525676B2 (en)*2005-04-202009-04-28Xerox CorporationSystem and method for controlling access to programming options of a multifunction device
US20060238789A1 (en)*2005-04-202006-10-26Xerox CorporationSystem and method for controlling access to programming options of a multifunction device
US10510214B2 (en)2005-07-082019-12-17Cfph, LlcSystem and method for peer-to-peer wireless gaming
US10733847B2 (en)2005-07-082020-08-04Cfph, LlcSystem and method for gaming
US8506400B2 (en)2005-07-082013-08-13Cfph, LlcSystem and method for wireless gaming system with alerts
US10460566B2 (en)2005-07-082019-10-29Cfph, LlcSystem and method for peer-to-peer wireless gaming
US20070016940A1 (en)*2005-07-082007-01-18Jdi Ventures, Inc. D/B/A Peak Performance SolutionsIdentification and password management device
US8708805B2 (en)2005-07-082014-04-29Cfph, LlcGaming system with identity verification
US11069185B2 (en)2005-07-082021-07-20Interactive Games LlcSystem and method for wireless gaming system with user profiles
US8613658B2 (en)2005-07-082013-12-24Cfph, LlcSystem and method for wireless gaming system with user profiles
US8070604B2 (en)2005-08-092011-12-06Cfph, LlcSystem and method for providing wireless gaming as a service application
US7637810B2 (en)2005-08-092009-12-29Cfph, LlcSystem and method for wireless gaming system with alerts
US11636727B2 (en)2005-08-092023-04-25Cfph, LlcSystem and method for providing wireless gaming as a service application
US8690679B2 (en)2005-08-092014-04-08Cfph, LlcSystem and method for providing wireless gaming as a service application
EP1925113A4 (en)*2005-09-162011-05-04Tara Chand SinghalSystems and methods for multi-factor remote user authentication
US20070081696A1 (en)*2005-09-222007-04-12Technology Licensing CorporationBiometric control for kitchen appliance
US7811172B2 (en)2005-10-212010-10-12Cfph, LlcSystem and method for wireless lottery
US11553481B2 (en)2006-01-062023-01-10Proxense, LlcWireless network synchronization of cells and client devices on a network
US11219022B2 (en)2006-01-062022-01-04Proxense, LlcWireless network synchronization of cells and client devices on a network with dynamic adjustment
US11212797B2 (en)2006-01-062021-12-28Proxense, LlcWireless network synchronization of cells and client devices on a network with masking
US11800502B2 (en)2006-01-062023-10-24Proxense, LLWireless network synchronization of cells and client devices on a network
US11206664B2 (en)2006-01-062021-12-21Proxense, LlcWireless network synchronization of cells and client devices on a network
US8403214B2 (en)2006-04-182013-03-26Bgc Partners, Inc.Systems and methods for providing access to wireless gaming devices
US20070241187A1 (en)*2006-04-182007-10-18Dean AlderucciSystems and methods for providing access to wireless gaming devices
US7644861B2 (en)2006-04-182010-01-12Bgc Partners, Inc.Systems and methods for providing access to wireless gaming devices
US10957150B2 (en)2006-04-182021-03-23Cfph, LlcSystems and methods for providing access to wireless gaming devices
US10460557B2 (en)2006-04-182019-10-29Cfph, LlcSystems and methods for providing access to a system
US11182792B2 (en)*2006-05-052021-11-23Proxense, LlcPersonal digital key initialization and registration for secure transactions
US20220036367A1 (en)*2006-05-052022-02-03Proxense, LlcPersonal Digital Key Initialization and Registration for Secure Transactions
US8397985B2 (en)2006-05-052013-03-19Cfph, LlcSystems and methods for providing access to wireless gaming devices
US8840018B2 (en)2006-05-052014-09-23Cfph, LlcDevice with time varying signal
US8899477B2 (en)2006-05-052014-12-02Cfph, LlcDevice detection
US10535223B2 (en)2006-05-052020-01-14Cfph, LlcGame access device with time varying signal
US12397226B2 (en)2006-05-052025-08-26Interactive Games LlcUser verification for gambling application based on location and the user's prior wagers
US12014369B2 (en)*2006-05-052024-06-18Proxense, LlcPersonal digital key initialization and registration for secure transactions
US8939359B2 (en)2006-05-052015-01-27Cfph, LlcGame access device with time varying signal
US11024120B2 (en)2006-05-052021-06-01Cfph, LlcGame access device with time varying signal
US10751607B2 (en)2006-05-052020-08-25Cfph, LlcSystems and methods for providing access to locations and services
US8740065B2 (en)2006-05-052014-06-03Cfph, LlcSystems and methods for providing access to wireless gaming devices
US8695876B2 (en)2006-05-052014-04-15Cfph, LlcSystems and methods for providing access to wireless gaming devices
US11229835B2 (en)2006-05-052022-01-25Cfph, LlcSystems and methods for providing access to wireless gaming devices
US10764044B1 (en)*2006-05-052020-09-01Proxense, LlcPersonal digital key initialization and registration for secure transactions
US7549576B2 (en)2006-05-052009-06-23Cfph, L.L.C.Systems and methods for providing access to wireless gaming devices
US11551222B2 (en)2006-05-052023-01-10Proxense, LlcSingle step transaction authentication using proximity and biometric input
US11157909B2 (en)2006-05-052021-10-26Proxense, LlcTwo-level authentication for secure transactions
US10286300B2 (en)2006-05-052019-05-14Cfph, LlcSystems and methods for providing access to locations and services
US12400518B2 (en)2006-05-052025-08-26Interactive Games LlcSystem for facilitating online wagering with nearby mobile phones
US20080091639A1 (en)*2006-06-142008-04-17Davis Charles F LSystem to associate a demographic to a user of an electronic system
US7818290B2 (en)2006-06-142010-10-19Identity Metrics, Inc.System to associate a demographic to a user of an electronic system
US8695086B2 (en)2006-06-142014-04-08Identity Metrics, Inc.System and method for user authentication
US8051468B2 (en)2006-06-142011-11-01Identity Metrics LlcUser authentication system
US8260740B2 (en)2006-06-142012-09-04Identity Metrics LlcSystem to associate a demographic to a user of an electronic system
US20080092209A1 (en)*2006-06-142008-04-17Davis Charles F LUser authentication system
US20080091453A1 (en)*2006-07-112008-04-17Meehan Timothy EBehaviormetrics application system for electronic transaction authorization
US8161530B2 (en)2006-07-112012-04-17Identity Metrics, Inc.Behaviormetrics application system for electronic transaction authorization
US20080046750A1 (en)*2006-08-182008-02-21Associated Network Solutions PlcAuthentication method
US8843754B2 (en)*2006-09-152014-09-23Identity Metrics, Inc.Continuous user identification and situation analysis with identification of anonymous users through behaviormetrics
US20080092245A1 (en)*2006-09-152008-04-17Agent Science Technologies, Inc.Multi-touch device behaviormetric user authentication and dynamic usability system
US8452978B2 (en)2006-09-152013-05-28Identity Metrics, LLCSystem and method for user authentication and dynamic usability of touch-screen devices
US20080098456A1 (en)*2006-09-152008-04-24Agent Science Technologies, Inc.Continuous user identification and situation analysis with identification of anonymous users through behaviormetrics
US10535221B2 (en)2006-10-262020-01-14Interactive Games LlcSystem and method for wireless gaming with location determination
US9306952B2 (en)2006-10-262016-04-05Cfph, LlcSystem and method for wireless gaming with location determination
US11017628B2 (en)2006-10-262021-05-25Interactive Games LlcSystem and method for wireless gaming with location determination
US8292741B2 (en)2006-10-262012-10-23Cfph, LlcApparatus, processes and articles for facilitating mobile gaming
US10943471B1 (en)2006-11-132021-03-09Proxense, LlcBiometric authentication using proximity and secure information on a user device
US12380797B2 (en)2006-11-132025-08-05Proxense, LlcBiometric authentication using proximity and secure information on a user device
US9280648B2 (en)2006-11-142016-03-08Cfph, LlcConditional biometric access in a gaming environment
US8645709B2 (en)2006-11-142014-02-04Cfph, LlcBiometric access data encryption
US10706673B2 (en)2006-11-142020-07-07Cfph, LlcBiometric access data encryption
US8510567B2 (en)2006-11-142013-08-13Cfph, LlcConditional biometric access in a gaming environment
US8784197B2 (en)2006-11-152014-07-22Cfph, LlcBiometric access sensitivity
US11182462B2 (en)2006-11-152021-11-23Cfph, LlcBiometric access sensitivity
US10546107B2 (en)2006-11-152020-01-28Cfph, LlcBiometric access sensitivity
US9411944B2 (en)2006-11-152016-08-09Cfph, LlcBiometric access sensitivity
US20080183820A1 (en)*2007-01-292008-07-31Fuji Xerox Co., Ltd.Device Orchestration
US8909702B2 (en)*2007-01-292014-12-09Fuji Xerox Co., Ltd.System and method for coordination of devices in a presentation environment
US8581721B2 (en)2007-03-082013-11-12Cfph, LlcGame access device with privileges
US9183693B2 (en)2007-03-082015-11-10Cfph, LlcGame access device
US10424153B2 (en)2007-03-082019-09-24Cfph, LlcGame access device with privileges
US10332155B2 (en)2007-03-082019-06-25Cfph, LlcSystems and methods for determining an amount of time an object is worn
US11055958B2 (en)2007-03-082021-07-06Cfph, LlcGame access device with privileges
US10366562B2 (en)2007-03-142019-07-30Cfph, LlcMulti-account access device
US8319601B2 (en)2007-03-142012-11-27Cfph, LlcGame account access device
US11055954B2 (en)2007-03-142021-07-06Cfph, LlcGame account access device
US8255977B2 (en)*2007-08-012012-08-28China Iwncomm Co., Ltd.Trusted network connect method based on tri-element peer authentication
US20100077454A1 (en)*2007-08-012010-03-25China Iwncomm Co., LtdTrusted network connect method based on tri-element peer authentication
US10126942B2 (en)*2007-09-192018-11-13Apple Inc.Systems and methods for detecting a press on a touch-sensitive surface
US9110590B2 (en)2007-09-192015-08-18Typesoft Technologies, Inc.Dynamically located onscreen keyboard
US10203873B2 (en)2007-09-192019-02-12Apple Inc.Systems and methods for adaptively presenting a keyboard on a touch-sensitive display
US10908815B2 (en)2007-09-192021-02-02Apple Inc.Systems and methods for distinguishing between a gesture tracing out a word and a wiping motion on a touch-sensitive keyboard
US20150324116A1 (en)*2007-09-192015-11-12Apple Inc.Systems and methods for detecting a press on a touch-sensitive surface
US12033494B2 (en)2007-11-092024-07-09Proxense, LlcProximity-sensor supporting multiple application services
US11562644B2 (en)2007-11-092023-01-24Proxense, LlcProximity-sensor supporting multiple application services
US10769939B2 (en)2007-11-092020-09-08Proxense, LlcProximity-sensor supporting multiple application services
JP2009122789A (en)*2007-11-132009-06-04Nec CorpComputer system
US8590009B2 (en)2007-11-132013-11-19Nec CorporationComputer system for port forwarding
US20090125982A1 (en)*2007-11-132009-05-14Yutaka HirataComputer system for port forwarding
US10284454B2 (en)2007-11-302019-05-07Activision Publishing, Inc.Automatic increasing of capacity of a virtual space in a virtual world
US11972086B2 (en)2007-11-302024-04-30Activision Publishing, Inc.Automatic increasing of capacity of a virtual space in a virtual world
US11080378B1 (en)2007-12-062021-08-03Proxense, LlcHybrid device having a personal digital key and receiver-decoder circuit and methods of use
US11086979B1 (en)2007-12-192021-08-10Proxense, LlcSecurity system and method for controlling access to computing resources
US10627983B2 (en)2007-12-242020-04-21Activision Publishing, Inc.Generating data for managing encounters in a virtual world environment
US10971251B1 (en)2008-02-142021-04-06Proxense, LlcProximity-based healthcare management system with automatic access to private information
US11727355B2 (en)2008-02-142023-08-15Proxense, LlcProximity-based healthcare management system with automatic access to private information
US12271865B2 (en)2008-02-142025-04-08Proxense, LlcProximity-based healthcare management system with automatic access to private information
US11120449B2 (en)2008-04-082021-09-14Proxense, LlcAutomated service-based order processing
US20090279851A1 (en)*2008-04-092009-11-12Sony CorporationCaptured image data management method and image capturing apparatus
US20090284347A1 (en)*2008-05-152009-11-19International Business Machines CorporationIdentity verification badge and method for utilizing same in a security system
US8390428B2 (en)*2008-05-152013-03-05International Business Machines CorporationIdentity verification badge and security system
US11308156B1 (en)2008-07-292022-04-19Mimzi, LlcPhotographic memory
US11086929B1 (en)2008-07-292021-08-10Mimzi LLCPhotographic memory
US9792361B1 (en)2008-07-292017-10-17James L. GeerPhotographic memory
US11782975B1 (en)2008-07-292023-10-10Mimzi, LlcPhotographic memory
US9128981B1 (en)2008-07-292015-09-08James L. GeerPhone assisted ‘photographic memory’
US9454270B2 (en)2008-09-192016-09-27Apple Inc.Systems and methods for detecting a press on a touch-sensitive surface
US9069390B2 (en)2008-09-192015-06-30Typesoft Technologies, Inc.Systems and methods for monitoring surface sanitation
US20130085941A1 (en)*2008-09-302013-04-04Apple Inc.Systems and methods for secure wireless financial transactions
US8826368B2 (en)2009-04-282014-09-02China Iwncomm Co., Ltd.Platform authentication method suitable for trusted network connect architecture based on tri-element peer authentication
US20100306054A1 (en)*2009-05-282010-12-02Drake Robert AMethod and apparatus for generating advertisements
US10376793B2 (en)2010-02-182019-08-13Activision Publishing, Inc.Videogame system and method that enables characters to earn virtual fans by completing secondary objectives
US20130061303A1 (en)*2010-02-252013-03-07Idondemand, Inc.Authentication System and Method in a Contactless Environment
US12273339B1 (en)2010-03-152025-04-08Proxense, LlcProximity-based system for automatic application or data access and item tracking
US11095640B1 (en)2010-03-152021-08-17Proxense, LlcProximity-based system for automatic application or data access and item tracking
ITPD20100088A1 (en)*2010-03-192010-06-18Antonio Maritan MANAGEMENT OF TELEMATIC TRANSACTIONS BY "STRONG" AUTHENTICATION OF THE USER'S IDENTITY. B.OTP-SA SYSTEM - BIOMETRIC ONE-TIME-PASSWORD STRONG AUTHENTICATION (STRONG AUTHENTICATION WITH BETWEEN BIOMETRIC AND ETHERPORIAN PASSWORD).
EP2367354A1 (en)*2010-03-192011-09-21Antonio MaritanApparatus for the identification certain and safe of the identity of an user in on-line transmission of multimedia content and the like
US10421019B2 (en)2010-05-122019-09-24Activision Publishing, Inc.System and method for enabling players to participate in asynchronous, competitive challenges
US11546325B2 (en)2010-07-152023-01-03Proxense, LlcProximity-based system for object tracking
US8956231B2 (en)2010-08-132015-02-17Cfph, LlcMulti-process communication regarding gaming information
US8974302B2 (en)2010-08-132015-03-10Cfph, LlcMulti-process communication regarding gaming information
US12434138B2 (en)2010-08-132025-10-07Interactive Games LlcGambling service with adaptive location checking frequency
US12420181B2 (en)2010-08-132025-09-23Interactive Games LlcSmart phone with gambling application that checks for unauthorized applications and processes
US10406446B2 (en)2010-08-132019-09-10Interactive Games LlcMulti-process communication regarding gaming information
US12409382B2 (en)2010-08-132025-09-09Interactive Games LlcSmart phone with wrapper application that checks whether the smart phone may use a gambling application
US10744416B2 (en)2010-08-132020-08-18Interactive Games LlcMulti-process communication regarding gaming information
US8584222B2 (en)2010-10-012013-11-12Hid Global GmbhSecure pin reset process
US11100481B2 (en)*2010-10-142021-08-24Jpmorgan Chase Bank, N.A.Image authentication and security system and method
US11113482B1 (en)2011-02-212021-09-07Proxense, LlcImplementation of a proximity-based system for object tracking and automatic application initialization
US11669701B2 (en)2011-02-212023-06-06Proxense, LlcImplementation of a proximity-based system for object tracking and automatic application initialization
US11132882B1 (en)2011-02-212021-09-28Proxense, LlcProximity-based system for object tracking and automatic application initialization
US12056558B2 (en)2011-02-212024-08-06Proxense, LlcProximity-based system for object tracking and automatic application initialization
WO2012135681A3 (en)*2011-03-302012-11-29Qualcomm IncorporatedContinuous voice authentication for a mobile device
US9444816B2 (en)2011-03-302016-09-13Qualcomm IncorporatedContinuous voice authentication for a mobile device
WO2012166979A3 (en)*2011-05-312013-03-28Cleankeys Inc.System for detecting a user on a sensor-based surface
DE102012220130B4 (en)2011-11-202019-04-04International Business Machines Corporation Procedure and system for granting access to secure facilities
US9104260B2 (en)2012-04-102015-08-11Typesoft Technologies, Inc.Systems and methods for detecting a press on a touch-sensitive surface
US20140006795A1 (en)*2012-06-292014-01-02Apple Inc.Continual Authorization for Secured Functions
US10212158B2 (en)*2012-06-292019-02-19Apple Inc.Automatic association of authentication credentials with biometrics
US9819676B2 (en)2012-06-292017-11-14Apple Inc.Biometric capture for unauthorized user identification
US20140007185A1 (en)*2012-06-292014-01-02Apple Inc.Automatic Association of Authentication Credentials with Biometrics
US9832189B2 (en)*2012-06-292017-11-28Apple Inc.Automatic association of authentication credentials with biometrics
US20150199687A1 (en)*2012-06-292015-07-16Apple Inc.Continual authorization for secured functions
US9959539B2 (en)*2012-06-292018-05-01Apple Inc.Continual authorization for secured functions
US9979721B2 (en)*2013-04-112018-05-22Tencent Technology (Shenzhen) Company LimitedMethod, server, client and system for verifying verification codes
US9489086B1 (en)2013-04-292016-11-08Apple Inc.Finger hover detection for improved typing
US11914695B2 (en)2013-05-102024-02-27Proxense, LlcSecure element as a digital pocket
US10909229B2 (en)2013-05-102021-02-02Proxense, LlcSecure element as a digital pocket
US12373538B2 (en)2013-05-102025-07-29Proxense, LlcSecure element as a digital pocket
US20140366158A1 (en)*2013-06-082014-12-11Apple, Inc.Using Biometric Verification to Grant Access to Redacted Content
WO2014197112A1 (en)*2013-06-082014-12-11Apple Inc.Using biometric verification to grant access to redacted content
US10289852B2 (en)*2013-06-082019-05-14Apple Inc.Using biometric verification to grant access to redacted content
US10552617B2 (en)*2013-06-082020-02-04Apple Inc.Using biometric verification to grant access to redacted content
TWI514183B (en)*2013-06-082015-12-21Apple Inc Use biometric verification to grant access to authored content
US9721107B2 (en)*2013-06-082017-08-01Apple Inc.Using biometric verification to grant access to redacted content
CN109815671A (en)*2013-06-082019-05-28苹果公司It is authorized using biological characteristic validation to by the access right of content of edit
CN105378743A (en)*2013-06-082016-03-02苹果公司 Use biometric authentication to grant access to edited content
US20150066762A1 (en)*2013-08-282015-03-05Geoffrey W. ChattertonAuthentication system
US20170154180A1 (en)*2013-08-282017-06-01Paypal, Inc.Authentication system
US10776479B2 (en)*2013-08-282020-09-15Paypal, Inc.Authentication system
US10331866B2 (en)2013-09-062019-06-25Apple Inc.User verification for changing a setting of an electronic device
US11314411B2 (en)2013-09-092022-04-26Apple Inc.Virtual keyboard animation
US11676188B2 (en)2013-09-092023-06-13Apple Inc.Methods of authenticating a user
US12131019B2 (en)2013-09-092024-10-29Apple Inc.Virtual keyboard animation
US10289302B1 (en)2013-09-092019-05-14Apple Inc.Virtual keyboard animation
US20180288040A1 (en)*2013-09-252018-10-04Jpmorgan Chase Bank, N.A.System and Method for Biometric Authentication-Based Electronic Notary Public
US20150082890A1 (en)*2013-09-262015-03-26Intel CorporationBiometric sensors for personal devices
US10735412B2 (en)2014-01-312020-08-04Apple Inc.Use of a biometric image for authorization
US12223020B2 (en)*2014-02-042025-02-11Lenovo (Singapore) Pte. Ltd.Biometric account card
US20190370446A1 (en)*2014-02-042019-12-05Lenovo (Singapore) Pte. Ltd.Biometric account card
US9268928B2 (en)2014-04-062016-02-23International Business Machines CorporationSmart pen system to restrict access to security sensitive devices while continuously authenticating the user
US10286326B2 (en)2014-07-032019-05-14Activision Publishing, Inc.Soft reservation system and method for multiplayer video games
US10857468B2 (en)2014-07-032020-12-08Activision Publishing, Inc.Systems and methods for dynamically weighing match variables to better tune player matches
US10376792B2 (en)2014-07-032019-08-13Activision Publishing, Inc.Group composition matchmaking system and method for multiplayer video games
US10322351B2 (en)2014-07-032019-06-18Activision Publishing, Inc.Matchmaking system and method for multiplayer video games
US10433787B2 (en)2014-07-072019-10-083M Electronic Monitoring LtdSelf-administered tamper-evident drug detection
US10668381B2 (en)2014-12-162020-06-02Activision Publishing, Inc.System and method for transparently styling non-player characters in a multiplayer video game
US10118099B2 (en)2014-12-162018-11-06Activision Publishing, Inc.System and method for transparently styling non-player characters in a multiplayer video game
EP3038298A1 (en)*2014-12-232016-06-29Telefonica Digital España, S.L.U.A computer-implemented method for protecting classified content on a computing device and computer programs thereof
CN111049978A (en)*2014-12-302020-04-21小米科技有限责任公司Notification information display method and device
US10057072B2 (en)*2014-12-312018-08-21Schneider Electric USA, Inc.Industrial network certificate recovery by identifying secondary root certificate
US11524237B2 (en)2015-05-142022-12-13Activision Publishing, Inc.Systems and methods for distributing the generation of nonplayer characters across networked end user devices for use in simulated NPC gameplay sessions
US10315113B2 (en)2015-05-142019-06-11Activision Publishing, Inc.System and method for simulating gameplay of nonplayer characters distributed across networked end user devices
US11896905B2 (en)2015-05-142024-02-13Activision Publishing, Inc.Methods and systems for continuing to execute a simulation after processing resources go offline
US10868672B1 (en)2015-06-052020-12-15Apple Inc.Establishing and verifying identity using biometrics while protecting user privacy
US11140171B1 (en)2015-06-052021-10-05Apple Inc.Establishing and verifying identity using action sequences while protecting user privacy
US10817935B1 (en)*2015-07-022020-10-27Jpmorgan Chase Bank, N.A.System and method for increasing credit worthiness of account holders
US10835818B2 (en)2015-07-242020-11-17Activision Publishing, Inc.Systems and methods for customizing weapons and sharing customized weapons via social networks
US10471348B2 (en)2015-07-242019-11-12Activision Publishing, Inc.System and method for creating and sharing customized video game weapon configurations in multiplayer video games via one or more social networks
US9983656B2 (en)*2015-12-312018-05-29Motorola Mobility LlcFingerprint sensor with power saving operating modes, and corresponding devices, systems, and methods
US20170192482A1 (en)*2015-12-312017-07-06Motorola Mobility LlcFingerprint Sensor With Power Saving Operating Modes, and Corresponding Devices, Systems, and Methods
US20190050549A1 (en)*2016-02-102019-02-14Grad Dna Ltd.A method and system for identification verification for mobile devices
US11157602B2 (en)*2016-02-102021-10-26Grad Dna Ltd.Method and system for identification verification for mobile devices
US10296998B2 (en)*2016-11-102019-05-21Mcafee, LlcOptical feedback for visual recognition authentication
US20210241409A1 (en)*2016-11-102021-08-05Mcafee, LlcOptical feedback for visual recognition authentication
US11836827B2 (en)*2016-11-102023-12-05Mcafee, LlcOptical feedback for visual recognition authentication
US11004168B2 (en)*2016-11-102021-05-11Mcafee, LlcOptical feedback for visual recognition authentication
US10500498B2 (en)2016-11-292019-12-10Activision Publishing, Inc.System and method for optimizing virtual games
US10987588B2 (en)2016-11-292021-04-27Activision Publishing, Inc.System and method for optimizing virtual games
US20190087557A1 (en)*2017-09-182019-03-21Dov MoranSystem, device and method for logging-in by staring at a display device
US11720655B2 (en)*2017-09-182023-08-08Dov MoranSystem, device and method for logging-in by staring at a display device
US10974150B2 (en)2017-09-272021-04-13Activision Publishing, Inc.Methods and systems for improved content customization in multiplayer gaming environments
US11040286B2 (en)2017-09-272021-06-22Activision Publishing, Inc.Methods and systems for improved content generation in multiplayer gaming environments
US10561945B2 (en)2017-09-272020-02-18Activision Publishing, Inc.Methods and systems for incentivizing team cooperation in multiplayer gaming environments
US10765948B2 (en)2017-12-222020-09-08Activision Publishing, Inc.Video game content aggregation, normalization, and publication systems and methods
US11986734B2 (en)2017-12-222024-05-21Activision Publishing, Inc.Video game content aggregation, normalization, and publication systems and methods
US11413536B2 (en)2017-12-222022-08-16Activision Publishing, Inc.Systems and methods for managing virtual items across multiple video game environments
US10864443B2 (en)2017-12-222020-12-15Activision Publishing, Inc.Video game content aggregation, normalization, and publication systems and methods
WO2019212263A1 (en)*2018-05-022019-11-07Samsung Electronics Co., Ltd.System and method for resource access authentication
US11985132B2 (en)2018-05-022024-05-14Samsung Electronics Co., Ltd.System and method for resource access authentication
US11394705B2 (en)*2018-07-102022-07-19Ademco Inc.Systems and methods for verifying credentials to perform a secured operation in a connected system
US20220051256A1 (en)*2018-09-282022-02-17Nec CorporationServer, processing apparatus, and processing method
US11775972B2 (en)*2018-09-282023-10-03Nec CorporationServer, processing apparatus, and processing method
US11679330B2 (en)2018-12-182023-06-20Activision Publishing, Inc.Systems and methods for generating improved non-player characters
US11097193B2 (en)2019-09-112021-08-24Activision Publishing, Inc.Methods and systems for increasing player engagement in multiplayer gaming environments
US11443060B2 (en)*2019-10-292022-09-13Motorola Mobility LlcNote taking at a device based on whether the user is a known user, unknown user, or owner
US12420202B2 (en)2019-11-082025-09-23Activision Publishing, Inc.System and method for providing conditional access to virtual gaming items
US11712627B2 (en)2019-11-082023-08-01Activision Publishing, Inc.System and method for providing conditional access to virtual gaming items
US11295758B2 (en)2020-03-202022-04-05Seagate Technology LlcTrusted listening
US12343624B2 (en)2020-08-182025-07-01Activision Publishing, Inc.Multiplayer video games with virtual characters having dynamically modified fields of view
US11524234B2 (en)2020-08-182022-12-13Activision Publishing, Inc.Multiplayer video games with virtual characters having dynamically modified fields of view
US11351459B2 (en)2020-08-182022-06-07Activision Publishing, Inc.Multiplayer video games with virtual characters having dynamically generated attribute profiles unconstrained by predefined discrete values
US12284294B1 (en)*2023-01-042025-04-22Wells Fargo Bank, N.A.Authentication in metaverse
US12446014B2 (en)2023-09-062025-10-14Proxense, LlcWireless network synchronization of cells and client devices on a network
RU2825109C1 (en)*2023-09-262024-08-20ООО "Ф.А.К.К.Т Антифрод"Method and system for behavioral user profiling based on analysis of sensor signals of mobile device

Similar Documents

PublicationPublication DateTitle
US6968453B2 (en)Secure integrated device with secure, dynamically-selectable capabilities
US7028184B2 (en)Technique for digitally notarizing a collection of data streams
US6990444B2 (en)Methods, systems, and computer program products for securely transforming an audio stream to encoded text
US6948066B2 (en)Technique for establishing provable chain of evidence
US20020095586A1 (en)Technique for continuous user authentication
US20020095587A1 (en)Smart card with integrated biometric sensor
US11647385B1 (en)Security system for handheld wireless devices using time-variable encryption keys
CN111386514B (en) Expanding secure key storage for transaction confirmation
US12041189B2 (en)Method for storing and recovering key for blockchain-based system, and device therefor
CN107113175B (en)Multi-user strong authentication token
US8739266B2 (en)Universal authentication token
US20200265418A1 (en)Electronic device and method for providing digital signature service of block chain using the same
KR101800737B1 (en)Control method of smart device for self-identification, recording medium for performing the method
JP2021510978A (en) Systems and methods for binding verifiable claims
WO2013091532A1 (en)Image sensor and payment authentication method
JP2009510644A (en) Method and configuration for secure authentication
WO2021190197A1 (en)Method and apparatus for authenticating biometric payment device, computer device and storage medium
CN108885656A (en)account access
JP2008544710A (en) Method and apparatus for implementing encryption
WO2005098640A1 (en)Program, computer, and data processing method
CN115801287A (en) Signature authentication method and device
CN105187419B (en)A kind of authorization method, device, terminal and system
TWI696963B (en) Ticket issuing and admission verification system and method, and user terminal device used in ticket issuing and admission verification system
WO2007108397A1 (en)Communication system, server, client terminal device and communicating method
KR102739827B1 (en)Method for creating encryption key for digital property transaction in user terminal and system for implementing the same

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:DOYLE, RONALD P.;HIND, JOHN R.;PETERS, MARCIA L.;REEL/FRAME:011487/0222

Effective date:20010115

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp